Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography

Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography

Author: Ivan B. Djordjevic

Publisher: Mdpi AG

Published: 2022-08-17

Total Pages: 0

ISBN-13: 9783036550039

DOWNLOAD EBOOK

The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled "Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography" was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.


Physical-Layer Security and Quantum Key Distribution

Physical-Layer Security and Quantum Key Distribution

Author: Ivan B. Djordjevic

Publisher: Springer Nature

Published: 2019-09-14

Total Pages: 477

ISBN-13: 3030275655

DOWNLOAD EBOOK

This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material.


Quantum Cryptography and Secret-Key Distillation

Quantum Cryptography and Secret-Key Distillation

Author: Gilles van Assche

Publisher: Cambridge University Press

Published: 2006-06-29

Total Pages: 275

ISBN-13: 0521864852

DOWNLOAD EBOOK

This self-contained 2006 text introduces the principles and techniques of quantum cryptography, with specific focus on secret-key distillation. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.


Fundamentals of Quantum Data Structures

Fundamentals of Quantum Data Structures

Author: N.B. Singh

Publisher: N.B. Singh

Published: 426-01-01

Total Pages: 428

ISBN-13:

DOWNLOAD EBOOK

"Fundamentals of Quantum Data Structures" is a comprehensive guide that introduces the core concepts and principles underlying the marriage of quantum computing and data structures. Tailored for students, researchers, and professionals in the field of quantum computing, this book navigates through the essential foundations of quantum information processing, offering insights into quantum bits (qubits), quantum gates, and quantum algorithms. With clear explanations and practical examples, the book serves as an invaluable resource for those looking to grasp the fundamentals of organizing and manipulating data in the unique context of quantum computing.


Physical-Layer Security for 6G

Physical-Layer Security for 6G

Author: Parthajit Mohapatra

Publisher: John Wiley & Sons

Published: 2024-10-22

Total Pages: 389

ISBN-13: 1394170939

DOWNLOAD EBOOK

Meet the wireless security challenges of the future with this key volume The 6th generation of wireless communication technology—known as 6G—promises to bring both revolutionary advances and unique challenges. Secure communications will be harder than ever to achieve under the new integrated ground, air, and space networking paradigm, with increased connectivity creating the potential for increased vulnerability. Physical-layer security, which draws upon the physical properties of the channel or network to secure information, has emerged as a promising solution to these challenges. Physical-Layer Security for 6G provides a working introduction to these technologies and their burgeoning wireless applications. With particular attention to heterogeneous and distributed network scenarios, this book offers both the information-theory fundamentals and the most recent developments in physical-layer security. It constitutes an essential resource for meeting the unique security challenges of 6G. Physical-Layer Security for 6G readers will also find: Analysis of physical-layer security in the quality of security framework (QoSec) Detailed discussion of physical-layer security applications in visible light communication (VLC), intelligence reflecting surface (IRS), and more Practical use cases and demonstrations Physical-Layer Security for 6G is ideal for wireless research engineers as well as advanced graduate students in wireless technology.


Physical Layer Security

Physical Layer Security

Author: Khoa N. Le

Publisher: Springer Nature

Published: 2021-01-24

Total Pages: 213

ISBN-13: 3030553663

DOWNLOAD EBOOK

This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal multiple access (NOMA). The authors have provided these under various practical scenarios, and developed theoretical aspects to validate their proposed applications. Presents physical layer security (PLS) under correlated fading environments, 5G wireless networks, and NOMA networks; Provides end-to-end analyses, combination of channel correlation and outdated CSI and their effects on PL; Includes contributions of PLS research written by global experts in academia and industry.


Quantum Communication and Quantum Networking

Quantum Communication and Quantum Networking

Author: Alexander Sergienko

Publisher: Springer

Published: 2010-01-08

Total Pages: 324

ISBN-13: 3642117317

DOWNLOAD EBOOK

QUANTUMCOMM 2009––the International Conference on Quantum Communi- tion and Quantum Networking (from satellite to nanoscale)––took place in Vico Equense near Naples, Italy, during October 26–30, 2009. The conference made a significant step toward stimulating direct dialogue between the communities of quantum physics and quantum information researchers who work with photons, atoms, and electrons in pursuit of the common goal of investigating and utilizing the transfer of physical information between quantum systems. This meeting brought together experts in quantum communication, quantum inf- mation processing, quantum nanoscale physics, quantum photonics, and networking. In the light of traditional approaches to quantum information processing, quantum communication mainly deals with encoding and securely distributing quantum states of light in optical fiber or in free space in order to provide the technical means for quantum cryptography applications. Exciting advances in the area of quantum c- munication over the last decade have made the metropolitan quantum network a re- ity. Several papers presented at this meeting have demonstrated that quantum crypt- raphy is approaching the point of becoming a high-tech application rather than a - search subject. The natural distance limitation of quantum cryptography has been significantly augmented using ideas of global quantum communication with stab- orbit satellites. The results presented at this conference demonstrated that practical secure satellite communication is clearly within reach.


Physical-Layer Security

Physical-Layer Security

Author: Matthieu Bloch

Publisher: Cambridge University Press

Published: 2011-09-22

Total Pages: 347

ISBN-13: 1139496298

DOWNLOAD EBOOK

This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included.


Soft Computing for Problem Solving

Soft Computing for Problem Solving

Author: Jagdish Chand Bansal

Publisher: Springer

Published: 2018-10-30

Total Pages: 974

ISBN-13: 9811315957

DOWNLOAD EBOOK

This two-volume book presents outcomes of the 7th International Conference on Soft Computing for Problem Solving, SocProS 2017. This conference is a joint technical collaboration between the Soft Computing Research Society, Liverpool Hope University (UK), the Indian Institute of Technology Roorkee, the South Asian University New Delhi and the National Institute of Technology Silchar, and brings together researchers, engineers and practitioners to discuss thought-provoking developments and challenges in order to select potential future directions The book presents the latest advances and innovations in the interdisciplinary areas of soft computing, including original research papers in the areas including, but not limited to, algorithms (artificial immune systems, artificial neural networks, genetic algorithms, genetic programming, and particle swarm optimization) and applications (control systems, data mining and clustering, finance, weather forecasting, game theory, business and forecasting applications). It is a valuable resource for both young and experienced researchers dealing with complex and intricate real-world problems for which finding a solution by traditional methods is a difficult task.


Reversible Computation: Extending Horizons of Computing

Reversible Computation: Extending Horizons of Computing

Author: Irek Ulidowski

Publisher: Springer Nature

Published: 2020-05-13

Total Pages: 250

ISBN-13: 3030473619

DOWNLOAD EBOOK

This open access State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing on those that have emerged during COST Action IC1405 "Reversible Computation - Extending Horizons of Computing", a European research network that operated from May 2015 to April 2019. Reversible computation is a new paradigm that extends the traditional forwards-only mode of computation with the ability to execute in reverse, so that computation can run backwards as easily and naturally as forwards. It aims to deliver novel computing devices and software, and to enhance existing systems by equipping them with reversibility. There are many potential applications of reversible computation, including languages and software tools for reliable and recovery-oriented distributed systems and revolutionary reversible logic gates and circuits, but they can only be realized and have lasting effect if conceptual and firm theoretical foundations are established first.